Home
last modified time | relevance | path

Searched refs:avd (Results 1 – 25 of 32) sorted by relevance

12

/third_party/selinux/libselinux/src/
Dcompute_av.c17 struct av_decision *avd) in security_compute_av_flags_raw() argument
56 &avd->allowed, &avd->decided, in security_compute_av_flags_raw()
57 &avd->auditallow, &avd->auditdeny, in security_compute_av_flags_raw()
58 &avd->seqno, &avd->flags); in security_compute_av_flags_raw()
63 avd->flags = 0; in security_compute_av_flags_raw()
73 map_decision(tclass, avd); in security_compute_av_flags_raw()
88 struct av_decision *avd) in security_compute_av_raw() argument
96 avd->allowed = lavd.allowed; in security_compute_av_raw()
97 avd->decided = lavd.decided; in security_compute_av_raw()
98 avd->auditallow = lavd.auditallow; in security_compute_av_raw()
[all …]
Davc.c23 struct av_decision avd; member
435 if (node && ((node->ae.avd.decided & requested) == requested)) { in avc_lookup()
474 if (ae->avd.seqno < avc_cache.latest_notif) { in avc_insert()
477 ae->avd.seqno, avc_cache.latest_notif); in avc_insert()
489 memcpy(&node->ae.avd, &ae->avd, sizeof(ae->avd)); in avc_insert()
694 struct av_decision *avd, int result, void *a) in avc_audit() argument
698 denied = requested & ~avd->allowed; in avc_audit()
700 audited = denied & avd->auditdeny; in avc_audit()
704 audited = requested & avd->auditallow; in avc_audit()
736 static void avd_init(struct av_decision *avd) in avd_init() argument
[all …]
Dmapping.c209 map_decision(security_class_t tclass, struct av_decision *avd) in map_decision() argument
218 if (avd->allowed & mapping->perms[i]) in map_decision()
223 avd->allowed = result; in map_decision()
226 if (avd->decided & mapping->perms[i]) in map_decision()
231 avd->decided = result; in map_decision()
234 if (avd->auditallow & mapping->perms[i]) in map_decision()
236 avd->auditallow = result; in map_decision()
239 if (avd->auditdeny & mapping->perms[i]) in map_decision()
252 avd->auditdeny = result; in map_decision()
DcheckAccess.c75 struct av_decision avd; in selinux_check_passwd_access_internal() local
90 &avd); in selinux_check_passwd_access_internal()
92 if ((retval == 0) && ((requested & avd.allowed) == requested)) { in selinux_check_passwd_access_internal()
Daudit2why.c67 struct sepol_av_decision avd; in check_booleans() local
113 avc->av, &avd, &reason); in check_booleans()
322 struct sepol_av_decision avd; in analyze() local
376 rc = sepol_compute_av_reason_buffer(ssid, tsid, tclass, av, &avd, &reason, &reason_buf, 0); in analyze()
389 if (av & ~avd.auditdeny) { in analyze()
Dmapping.h32 map_decision(security_class_t tclass, struct av_decision *avd);
/third_party/selinux/libselinux/utils/
Dcompute_av.c11 struct av_decision avd; in main() local
37 ret = security_compute_av(argv[1], argv[2], tclass, 1, &avd); in main()
44 print_access_vector(tclass, avd.allowed); in main()
47 if (avd.decided != ~0U) { in main()
49 print_access_vector(tclass, avd.decided); in main()
53 if (avd.auditallow) { in main()
55 print_access_vector(tclass, avd.auditallow); in main()
59 if (avd.auditdeny != ~0U) { in main()
61 print_access_vector(tclass, avd.auditdeny); in main()
/third_party/selinux/libsepol/utils/
Dsepol_compute_av.c15 struct sepol_av_decision avd; in main() local
50 rc = sepol_compute_av(ssid, tsid, tclass, 0, &avd); in main()
53 printf("allowed: %s\n", sepol_av_perm_to_string(tclass, avd.allowed)); in main()
54 printf("decided: %s\n", sepol_av_perm_to_string(tclass, avd.decided)); in main()
55 printf("auditallow: %s\n", sepol_av_perm_to_string(tclass, avd.auditallow)); in main()
56 printf("auditdeny: %s\n", sepol_av_perm_to_string(tclass, avd.auditdeny)); in main()
Dsepol_check_access.c17 struct sepol_av_decision avd; in main() local
86 if (sepol_compute_av_reason_buffer(ssid, tsid, tclass, av, &avd, &reason, &reason_buf, 0) < 0) { in main()
91 if ((avd.allowed & av) == av) { in main()
/third_party/selinux/libsepol/src/
Dservices.c844 struct sepol_av_decision *avd,
853 struct sepol_av_decision *avd, in type_attribute_bounds_av() argument
889 masked = ~lo_avd.allowed & avd->allowed; in type_attribute_bounds_av()
895 avd->allowed &= ~masked; in type_attribute_bounds_av()
908 struct sepol_av_decision *avd, in context_struct_compute_av() argument
931 avd->allowed = 0; in context_struct_compute_av()
932 avd->decided = 0xffffffff; in context_struct_compute_av()
933 avd->auditallow = 0; in context_struct_compute_av()
934 avd->auditdeny = 0xffffffff; in context_struct_compute_av()
935 avd->seqno = latest_granting; in context_struct_compute_av()
[all …]
Dconditional.c862 struct sepol_av_decision *avd) in cond_compute_av() argument
866 if (!ctab || !key || !avd) in cond_compute_av()
873 avd->allowed |= node->datum.data; in cond_compute_av()
881 avd->auditdeny &= node->datum.data; in cond_compute_av()
884 avd->auditallow |= node->datum.data; in cond_compute_av()
Dexpand.c3217 avtab_datum_t *avd; in expand_avtab_insert() local
3252 avd = &node->datum; in expand_avtab_insert()
3257 avd->data |= d->data; in expand_avtab_insert()
3260 avd->data &= d->data; in expand_avtab_insert()
3361 avtab_datum_t *avd; in expand_cond_insert() local
3386 avd = &node->datum; in expand_cond_insert()
3390 avd->data |= d->data; in expand_cond_insert()
3393 avd->data &= d->data; in expand_cond_insert()
/third_party/flutter/flutter/packages/flutter_tools/test/general.shard/android/
Dandroid_emulator_test.dart32 'avd.ini.displayname': displayName,
46 'avd.ini.displayname': displayName,
57 'avd.ini.notadisplayname': 'this is not a display name',
69 avd.ini.displayname = dispName
74 expect(results['avd.ini.displayname'], 'dispName');
Dandroid_device_test.dart605 /// "avd name" requests with the supplied name.
609 // Include OK in the same packet here. In the response to "avd name"
623 if (text == 'avd name\n') {
/third_party/selinux/libsepol/include/sepol/policydb/
Dservices.h45 struct sepol_av_decision *avd); /* OUT */
57 struct sepol_av_decision *avd,
73 struct sepol_av_decision *avd,
Dconditional.h138 struct sepol_av_decision *avd);
/third_party/selinux/libselinux/include/selinux/
Dselinux.h194 struct av_decision *avd);
199 struct av_decision *avd);
205 struct av_decision *avd);
210 struct av_decision *avd);
Davc.h276 struct avc_entry_ref *aeref, struct av_decision *avd);
321 struct av_decision *avd, int result, void *auditdata);
/third_party/flutter/flutter/packages/flutter_tools/lib/src/android/
Dandroid_console.dart24 /// commands such as "avd name" which are not available to ADB.
45 _write('avd name\n');
Dandroid_emulator.dart38 String get name => _prop('avd.ini.displayname') ?? id.replaceAll('_', ' ').trim();
54 processManager.run(<String>[getEmulatorPath(), '-avd', id])
Dandroid_device.dart160 printTrace('Fetching avd name for $name via Android console on $host:$port');
175 onTimeout: () => throw TimeoutException('"avd name" timed out'));
180 printTrace('Failed to fetch avd name for emulator at $host:$port: $e');
/third_party/flutter/flutter/packages/flutter_tools/test/general.shard/
Demulator_test.dart95 await emulatorManager.createEmulator(name: 'existing-avd-1');
197 final List<String> _existingAvds = <String>['existing-avd-1'];
234 if (_equality.equals(args, <String>['create', 'avd', '-n', 'temp'])) {
239 <String>['create', 'avd', '-n', args[3], '-k', args[5], '-d', args[7]])) {
/third_party/selinux/checkpolicy/
Dcheckpolicy.c388 struct sepol_av_decision avd; in main() local
792 ret = sepol_compute_av(ssid, tsid, tclass, 0, &avd); in main()
796 for (i = 1; i <= sizeof(avd.allowed) * 8; i++) { in main()
797 if (avd.allowed & (UINT32_C(1) << (i - 1))) { in main()
1204 tclass, 0, &avd, &reason, in main()
/third_party/rust/crates/libc/ci/
Dandroid-install-sdk.sh68 ./sdk/cmdline-tools/tools/bin/avdmanager create avd \
/third_party/flutter/flutter/packages/flutter_tools/lib/src/
Demulator.dart116 'avd',
165 'avd',

12